Empowerment technology
ICT
• IT IS THE UMBRELLA THAT
COMMUNICATION INCLUDES ANY COMMUNICATION
DEVICE OR APPLICATION,
INCOMPASING, RADIO, TELEVISION,
CELLPHONE, COMPUTER, ECT.
ICT • IT IS ALSO MAIN METHOD OF
COMMUNICATION, AND
EDUCCATION, GETTING
INFORMATION TECHNOLOGY
INFORMATION AND ATTAINING
SERVICES, EXPRESSSING SOCIAL
ADVOCATES AND AWARENESS
WORLD WIDE WEB
CURRENT STATE TECHNOLOGY
• WEB 1.0
• WEB 2.0
• WEB 3.0
WEB 1.0
• IN THIS STAGE OF INTERNET • EXAMPLE:
TECHNOLOGY THERE WERE VERY
WEB CONTENT CREATORS AND
MANY OF THEM WERE SO CALLED
‘‘READ ONLY WEB’’
• THERE WERE NO USER
INTEACTION
• WEB PAGES ARE STATIC
• THE FEEDBACK MECHANISM WAS
THRU PRIVATE EMAIL.
• NO DIRECT COMMENT AVAILABLE
WEB 2.0
• THE TERM WEB 2.0 WAS USED
AROUND 2004
• INTERNET TECHNOLOGY BECOME
MORE AND MORE INTERACTIVE
(USE OF SOCIAL MEDIA BEGINS)
• THE INTERNET BECAME MORE
AVAILABLE TO EVERY ONE
• THE USERS CAN NOW INTERACT,
CONTRIBUTE AND CREAT THERE
OWN INTERNET SPACE AND
CONTENT
WEB 3.0
• IT IS DESCOVERED BY, TIM
BERNES-LEE (FATHER OF THE
WORLD WIDE WEB) AS THE READ-
WRITE –EXECUTE WEB
• IT IS REFFERED TO AS THE
SEMANTIC WEB OR DATA DRIVEN
WEB CONTENT AND RESPONSE.
• IT WILL NOT MAKE THE WEB 2.0
OBSELETE
TECHNOLOGY
CONVERGENCE
TECHNOLOGY CONVERGENCE
• IT IS AN EVOLUTION OF TECHNOLOGICAL FACEBOOK
DEVELOPMENT THAT MERGE INTO A NEW
SYSTEMS BRINGING TOGETHER DIFFERENT
TYPES OF APPLICANTS AND MEDIA
SOCIAL MEDIA
• INTERNET CONNECTION
• IT IS A COLLECTION OF INTERNET –BASED
COMMUNICATION TOOLS AND COMPUTER-
ASSISTED CHANNELS DEDICATED TO ALLOW
USERS TO INTERACT ,COMMUNICATE ,AND
SHARE INFORMATION IN A VIRTUAL
COMMUNITY AND NETWORK.
FACEBOOK
• IS A POPULAR AND FAMOUS
• IS A POPULAR AND FREE AND SOCIAL NETWORKING SITE
WITH MORE THAN A BILLION USERS TO CREATE PROFILES
,UPLOAD PHOTO AND VIDEOS, CREATE AND JOIN GROUPS,
REACT TO FRIENDS POST ,CREATE EVENTS, SEND MESSAGES
,KEEPING IN TOUCH WITH CLOSE FRIENDS,AND RELATIVES.
TWITTER
• WITH MORE THAN 300 MILLION USERS IN 2016
• ALLOWS USERS TO MICROBLOG OR BROADCAST SHORT
MESSAGE CALLED ‘’TWEETS.’’
INSTAGRAM
• A SOCIAL NETWORKING APP THAT ENABLES THE USER TO
SHARE MOBILE PHOTO AND VIDEO EITHER PUBLICITY OR
PRIVATELY.
SNAPCHAT
• DESIGNED FOR THE MOBILE NETWORKING APPLICATION.
• ALSO DESIGNED FOR PHOTO SHARING , CHAT AND
MESSAGING SERVICES.
ASSISTIVE MEDIA
• IT IS A NONPROFIT ORGANIZATION FOUNDED IN 1996 IN ANN
ARBOR, MICHIGAN USA.
• IT WAS THE FIRST INTERNET –BASED READING SERVICE FOR
PERSONS WITH VISUAL AND READING IMPAIRMENTS.
DANGERS ONLINE
EMAIL SPAM
• KNOWN AS JUNK EMAIL, USUALLY UNSOLICITATED
COMMERCIAL EMAIL SENT FROM ONE SOURCE WITH
IDENTICAL MESSAGE TO SEND TO MULTIPLE RECIPIENTS.
• SPAMMER - IS THE TERM USED TO REFER TO A PERSON WHO
CREATES ELECTRONIC SPAM.
•
EMAIL SPOOFING
• A DECIETFUL EMAIL PRACTICE IN WHICH THE SENDER
ADDRESS IS CHANGED SO THAT IT WOULD APPEAR TO HAVE
COME FROM A DIFFERENT SOURCES USUALLY SOMEONE YOU
KNOW.
• IT IS USUALLY USED BY SPAMMERS TO HIODE THE ORIGIN OF
THE SPAM.
PHISHING
• A DECEITFUL PRACTICE OF TRYING TO GET CONFIDENTIAL
INFORMATION SUCH AS PASSWORDS AND USERNAME,AND
CREDIT CARD details by making it appear as it if comes from a
trustworthy source
Pharming
• A dangerous hacker attack on a web site which directs all traffic to the web
site to another fictitious website.
• It main objective it to obtain username and passwords, as well as credit card
and financial information and use these to steal money electronically.
`
Spyware
• It is the computer program that is installed covertly on a personal computer
to collect information even take control over the computer without the
knowledge of the user.
Computer Worm
• It will delete your files
• Is a dangerous computer program that replicates itself though a network
then infect the system.
Trojan Horse
• A malicious software fronting to perform a good task, but covertly performs
undesirable function which the intension of entering the computer without
the users content.
• It can erase your data , can corrupt files
Computer Virus
• A program that duplicates itself & then infects the computer
• It spread like a real biological virus, where in attaches itself to a host
program and infects other computer it is received by a computer through the
internet.
• Virus can also be transferred by the use of removable storage
Hacker
• Is a person who is able to enter the control another peoples computer
without authorization.
• Be able to enter another computer, usually vandalizes the victims website,
steal personal information, obtains intellectual property, performs credit
cards fraud.
Protections From The
Danger
Security center
• Is the place where you can set additional proection from THREAT to your
computer, especially when using the internet.
SECURITY SETTING
FIREWALL
• Helps in protecting your computer from unauthorized entries viruses,or
worms from the internet or network.
Automatic updates
• Another feature of windows which when turned on will automatically
download updates from microsoft windows website.
Virus protection
• Is usually about the current antivirus software installed in your computer.
• Antivirus software is meant to locate, find ,and remove virus threats that are
already in your computer.
Contextualize Strategy
• Is to place (something , such as • The art of devising or employing
word or activity )in a context plans or strategies toward a goal.
Research • A careful plan or method
• The collecting about a particular Compilation
subject. • The act or process of compiling
Citation
• An act of quoting; especially the
citing of a previously settled case at
law.
Contextual Search
• Is attempt to be more precise in
providing the list documents
according to the words used by the
user to search the internet
• A good contextual research engine
would request for more
information to narrow down the
result of the research.
1.Identify or choose a topic
2.Topic or task definition
3.Identify methods of search
Experiments
Explore
Survey
RESEARCH SKILLS
Critical Thinking
• It is the ability to digest, reflect and
conclude from the information
searched.
ANALYTICAL THINKING
• The ability to look verbalize , conceptualized and gather data attuned
to the context of the subject.
The ability to apply synthesis focus and critical thinking to extract
the useful information.
PROBLEM SOLVING CAPABILITY
• The ability to present solution or solve problems by presenting a
decision based on the given information.
•People with this ability are able to define and identify the latitude of the
problem and present all possible solution.
ORGANIZED DATA MINING
• It is the ability to organized and catalogue all collected materials
efficiently despite data size.
RESEARCH PRESENTATION
• It is the ability to present ideas and draw conclusion from the research.
Be able to explain in writing the purpose , steps goals and objective of
the research.
CREATIVITY AND DEVELOPED
IMAGINATION
• It is the ability to look for alternative solutions to the problems needed
to solve in the research.
Thinking beyond the usual approaches to the research objectives.
COMPUTER LITERACY
• Knowledge of the various computer application and tools.
Skills in the use of software to write design and present.
Steps in contextualize Research
1. Open the google site.
2. On the upper right side of the window, click the google app icons & click search
G.
3. On the lower right part of the window , click setting and the google search setting
pop-up list will appear.
4. Click advanced search & the advanced search window will appear.
5. Type the keywords that you would like to search & click the advance search
button.
Identify good source from satirical source
• Satirical sites are websites that report untrue or false stories meant to amuse
or entertain.
• Untrue stories should not be shared with your friends, and family.
HOW TO DETECT SATIRICAL NEWS
1. If it is too good to be true,then it must be so.
2. If the news did not emanate from reliable news site.
3. If they are from known satirical sites.
LIST OF TOP SOURCES OF SATIRICAL
SITES
1. Adobo Chronicles ( adobochronicles.com )
2. So what’s News ?(sowhatsnews.wordpress.com)
3. Eritas Times (eritastime.com)
4. The Professional Heckler (ProfessionalHeckler.wordpress.com)
1. LIST AMERICAN SATIRICAL SITES IN
THE US
1. The Onion (theonion.com)
2. ClickHole (clickhole.com)
3.Christwire Global Media (christwire.org.)
MAIL MERGE AND LABEL
GENERATION
• It is used to automatically add mailing addresses or personalized information
to your publication.
PARTS OF MAIL MERGE
1. Recipient list
2. Publication with merge fields
3. Merge publication
MAILING START GROUP COMMANDS
• Mail merge Merges data into a publication which
will be printed mailed. Shows step by
step mail merge wizard.
• Email merge
Merge data into a publication that will
be sent as e-mail.
• Select recipients • Chooses the list of people you
intend to send the letter to. You can
type your own list use our outlook
contacts or connect to a database.
• Edit recipient list • Makes changes to the llist of
recipients and decide whichof them
should receive you letter.
• Insert Merge field • Adds a field from your recipient list
to the publication.